
Spruce Extension Security & Risk Analysis
wordpress.org/plugins/spruce-api-extensionA Spruce extension that offers a suite of features, including a Youtube live stream feed, Youtube channel feed, and an interactive JavaScript Map.
Is Spruce Extension Safe to Use in 2026?
Generally Safe
Score 100/100Spruce Extension has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The spruce-api-extension plugin, version 3.0.12, exhibits a generally strong security posture based on the static analysis. The absence of known CVEs and critical vulnerability history indicates a potentially well-maintained and secure codebase. The code demonstrates good practices with 100% of SQL queries utilizing prepared statements and a high percentage (93%) of output escaping. Furthermore, there are no critical or high-severity taint analysis flows, suggesting that potentially malicious input is not being processed in a dangerous manner.
However, there are several areas that raise concerns. The lack of nonce checks and capability checks across all entry points (AJAX, REST API, and shortcodes) is a significant weakness. This means that any user, regardless of their role or logged-in status, could potentially trigger the plugin's functionality. While the attack surface for AJAX and REST API is currently zero, this could change with future updates. The presence of file operations, even if not showing in the current taint analysis, warrants attention, as it can be a vector for malicious file manipulation if not handled with extreme care. The two shortcodes, while not explicitly showing unprotected aspects in this analysis, are potential entry points that should ideally have robust authorization checks.
In conclusion, while the plugin benefits from a clean vulnerability history and good practices in SQL and output escaping, the complete absence of nonce and capability checks on its entry points presents a notable risk. The plugin is currently secure from known vulnerabilities, but its internal security mechanisms for handling user input are lacking, leaving it open to potential exploitation if new vulnerabilities are introduced or if attackers can find ways to exploit the existing shortcodes. The presence of file operations also adds a layer of potential risk that needs careful monitoring.
Key Concerns
- Missing nonce checks on entry points
- Missing capability checks on entry points
- File operations present
- Shortcodes present without specific auth checks noted
Spruce Extension Security Vulnerabilities
Spruce Extension Code Analysis
Output Escaping
Data Flow Analysis
Spruce Extension Attack Surface
Shortcodes 2
WordPress Hooks 5
Maintenance & Trust
Spruce Extension Maintenance & Trust
Maintenance Signals
Community Trust
Spruce Extension Alternatives
No alternatives data available yet.
Spruce Extension Developer Profile
1 plugin · 0 total installs
How We Detect Spruce Extension
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/spruce-api-extension/assets/css/custom.css/wp-content/plugins/spruce-api-extension/assets/js/youtube.js/wp-content/plugins/spruce-api-extension/assets/js/main.js/wp-content/plugins/spruce-api-extension/assets/js/youtube.js/wp-content/plugins/spruce-api-extension/assets/js/main.jsspruce-api-extension/assets/css/custom.css?ver=spruce-api-extension/assets/js/youtube.js?ver=spruce-api-extension/assets/js/main.js?ver=HTML / DOM Fingerprints
et_pb_moduleet_pb_textet_pb_codeet_pb_button_module_wrapperet_pb_buttonlink-flashdata-field_iddata-subcommitteedata-project-titledata-requested-bydata-recipient-namedata-project-purpose+3 morespruce_api_extension<h1 style="text-align: left;">Watch Live</h1><p style="color: #B11F29; margin-bottom: 1rem;"><h3 style="color: black; font-weight: bold; line-height: 2rem;"><a class="et_pb_button et_pb_button_1 link-flash et_pb_bg_layout_light"